Severity High Analysis Summary The STOP/DJVU ransomware initially made headlines in 2018 and has since been attacking individuals all around the world. It’s widespread on torrent […]
Severity Medium Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
Severity High Analysis Summary Researchers have detected a notable cyber threat involving the use of the open-source rootkit known as Reptile, which is being deployed in […]
Severity High Analysis Summary CVE-2023-35388 CVSS:8 Microsoft Exchange Server could allow a remote authenticated attacker to execute arbitrary code on the system. By sending a specially […]
Severity High Analysis Summary Cybersecurity researchers have linked a significant cyber compromise of NPO Mashinostroyeniya, a major Russian missile engineering company, to two distinct North Korea-affiliated […]
Severity Medium Analysis Summary Snake is a modular .NET keylogger that was first spotted in late November 2020. Snake malware’s main feature is keylogging, but it […]
Severity Medium Analysis Summary Rhadamanthys is a type of malware known as a stealer, which is designed to steal sensitive information from infected computers. It was […]
Severity High Analysis Summary CVE-2023-4104 Mozilla VPN could allow a local authenticated attacker to bypass security restrictions, caused by an incomplete implementation of Polkit authentication. By […]
Severity Medium Analysis Summary CVE-2023-3373 CVSS:5.9 Mitsubishi Electric GOT2000 and GOT SIMPLE are vulnerable to a denial of service, caused by the use of predictable exact […]